A multi-layer information dispersal based encryption algorithm and its application for access control
Tài liệu tham khảo
Li, 2014, Secure and privacy-preserving data storage service in public cloud, J. Comput. Res. Dev., 51, 1397
Hong, 2010, AB-ACCS: a cryptographic access control scheme for cloud storage, J. Comput. Res. Dev., 47, 259
Tian, 2009, DSP re-encryption: a flexible mechanism for access control enforcement management in DaaS, 25
Zhou, 2013
Hu, 2017, Research on encryption strategy in large data environment based on proxy re-encryption, Int. J. Big Data Intell., 4, 10.1504/IJBDI.2017.10006118
Vimercati, 2007, Over-encryption: management of access control evolution on outsourced data, 123
Sun, 1997, Optimal information-dispersal for increasing the reliability of a distributed service, IEEE Trans. Reliab., 46, 462, 10.1109/24.693779
Rabin, 1989, Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM, 36, 335, 10.1145/62044.62050
Zhao, 2013, Towards high-performance and cost-effective distributed storage systems with information dispersal algorithms, 1
Bian, 2011, Security structure of cloud storage based on dispersal, J. Xian Jiaotong Univ., 45, 41
Muppavarapu, 2014, Semantic-based access control for data resources in open grid services architecture: data access and integration (OGSA-DAI), Int. J. Grid High Perform. Comput., 6, 1, 10.4018/ijghpc.2014040101
Bethencourt, 2007, Ciphertext-policy attribute-based encryption, 321
Hong, 2011, Achieving efficient dynamic cryptographic access control in cloud storage, J. Commun., 32, 125
Hong, 2017, Research on encryption strategy in large data environment based on proxy re-encryption, Int. J. Big Data Intell., 4
Merkle, 1981, On the security of multiple encryption, Commun. ACM, 24, 465, 10.1145/358699.358718
Kumar, 2016, Multiple encryption using ECC and its time complexity analysis, Int. J. Comput. Eng. Res. Trends, 3, 568, 10.22362/ijcert/2016/v3/i11/48907
Singh, 2013, A study of encryption algorithms (RSA, DES, 3DES and AES) for information security, Int. J. Comput. Appl., 67, 33
Qiao, 1998, Comparison of mpeg encryption algorithm, Comput. Graph., 22, 437, 10.1016/S0097-8493(98)00033-8
Tosun, 2001, Lightweight security mechanisms for wireless video transmission, 157
Tosun, 2002, Efficient multi-layer coding and encryption of mpeg video streams, 119
Qiao, 1997, A new algorithm for mpeg video encryption, 21
Gupta, 2013, High-performance hardware implementation for RC4 stream cipher, IEEE Trans. Comput., 64, 730, 10.1109/TC.2012.19
Fluhrer, 2001, Weaknesses in the key scheduling algorithm of RC4, 321
guo Feng, 2002, Status quo and trend of cryptography, J. China Inst. Commun., 23, 18